summaryrefslogtreecommitdiff
path: root/fuzz/mpi_sqrmod_target.cc
blob: d3886dacd43700b9e03e715058815e749c9f35f8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

/*
 * This target fuzzes NSS mpi against openssl bignum.
 * It therefore requires openssl to be installed.
 */

#include "mpi_helper.h"

extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
  // We require at least size 3 to get two integers from Data.
  if (size < 3) {
    return 0;
  }
  mp_int a, b, c;
  BN_CTX *ctx = BN_CTX_new();
  BN_CTX_start(ctx);
  BIGNUM *A = BN_CTX_get(ctx);
  BIGNUM *B = BN_CTX_get(ctx);
  BIGNUM *C = BN_CTX_get(ctx);
  assert(mp_init(&a) == MP_OKAY);
  assert(mp_init(&b) == MP_OKAY);
  assert(mp_init(&c) == MP_OKAY);
  size_t max_size = 4 * size + 1;
  parse_input(data, size, A, &a);

  // We can't divide by 0.
  if (mp_cmp_z(&b) == 0) {
    mp_clear(&a);
    mp_clear(&b);
    mp_clear(&c);
    BN_CTX_end(ctx);
    BN_CTX_free(ctx);
    return 0;
  }

  // Compare with OpenSSL square mod
  assert(mp_sqrmod(&a, &b, &c) == MP_OKAY);
  (void)BN_mod_sqr(C, A, B, ctx);
  check_equal(C, &c, max_size);

  mp_clear(&a);
  mp_clear(&b);
  mp_clear(&c);
  BN_CTX_end(ctx);
  BN_CTX_free(ctx);

  return 0;
}